Results 11 - 20
of
565
The S/KEY One-Time Password System
- In Proceedings of the Internet Society Symposium on Network and Distributed Systems
, 1994
"... Computing systems have been under increasingly sophisticated attack over the Internet and by using dial-up access ports. One form of attack is eavesdropping on network connections to obtain login id's and passwords of legitimate users. This information is used at a later time to attack the syst ..."
Abstract
-
Cited by 255 (1 self)
- Add to MetaCart
Computing systems have been under increasingly sophisticated attack over the Internet and by using dial-up access ports. One form of attack is eavesdropping on network connections to obtain login id's and passwords of legitimate users. This information is used at a later time to attack
Modem Pool Simulation And Performance Analysis
"... In the near future, dial-up connections will still be one of the most popular methods of remote access to the Internet as well as to enterprise networks. The dimensioning of modem pools to support this type of access is of particular importance to commercial Internet service providers (ISPs) as well ..."
Abstract
- Add to MetaCart
In the near future, dial-up connections will still be one of the most popular methods of remote access to the Internet as well as to enterprise networks. The dimensioning of modem pools to support this type of access is of particular importance to commercial Internet service providers (ISPs
Exploiting Weak Connectivity for Mobile File Access
, 1995
"... Weak connectivity, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. In this paper, we describe how the Coda File System has evolved to exploit such networks. The underlying theme of this evolution has been the systematic introduction of adaptiv ..."
Abstract
-
Cited by 197 (22 self)
- Add to MetaCart
Weak connectivity, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. In this paper, we describe how the Coda File System has evolved to exploit such networks. The underlying theme of this evolution has been the systematic introduction
Honeycomb -- Creating Intrusion Detection Signatures Using Honeypots
- IN PROCEEDINGS OF THE SECOND WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-II
, 2004
"... This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present ..."
Abstract
-
Cited by 209 (2 self)
- Add to MetaCart
results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.
Regulated Retail Tariff Structures, Dial-Up Substitution and Broadband Diffusion: Learning from New Zealand’s Experience
, 2008
"... do not necessarily represent those of the institutions with which she is affiliated or their constituent members. Any errors or omissions remain the responsibility of the author. Despite an apparent absence of supply side impediments to the uptake of broadband, New Zealand has persistently exhibited ..."
Abstract
- Add to MetaCart
in substitution from legacy dial-up to frontier broadband internet access in New Zealand occurring at a higher user valuation of both internet connection and usage than if the telephony tariff was set at a level whereby the fixed component recovered fixed costs and the variable usage
Adaptive modem connection lifetimes
- In Proceedings of the 1999 USENIX Annual Technical Conference
, 1999
"... Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more ..."
Abstract
- Add to MetaCart
Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association:
Jin: \Workload Characterization of a Web Proxy in a Cable Modem Environment
"... workload characterization, performance, proxy caching This paper presents a detailed workload characterization study of a World-Wide Web proxy. Measurements from a proxy within an Internet Service Provider (ISP) environment were collected. This ISP allows clients to access the Web using highspeed ca ..."
Abstract
-
Cited by 74 (8 self)
- Add to MetaCart
cable modems rather than traditional dial-up modems. By examining this site we are able to evaluate the effects that cable modems have on proxy workloads. This paper focuses on workload characteristics such as file type distribution, file size distribution, file referencing behaviour and turnover
Network Working Group Request for Comments: 2341 Category
, 1998
"... This memo describes a historic protocol for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). All Rights Reserved. Virtual dial-up allows many separate and autonomous proto ..."
Abstract
- Add to MetaCart
protocol domains to share common access infrastructure including modems, Access Servers, and ISDN routers. Previous RFCs have specified protocols for supporting IP dial-up via SLIP [1] and multiprotocol dial-up via PPP [2]. This document describes the Layer Two Forwarding protocol (L2F) which permits
Load balancing in structured p2p systems
, 2003
"... Most P2P systems that provide a DHT abstraction distribute objects among “peer nodes ” by choosing random identifiers for the objects. This could result in an O(log N) imbalance. Besides, P2P systems can be highly heterogeneous, i.e. they may consist of peers that range from old desktops behind mode ..."
Abstract
-
Cited by 141 (0 self)
- Add to MetaCart
modem lines to powerful servers connected to the Internet through high-bandwidth lines. In this paper, we address the problem of load balancing in such P2P systems. We explore the space of designing load-balancing algorithms that uses the notion of “virtual servers”. We present three schemes that differ
Performing Replacement in Modem Pools
, 2000
"... We examine a policy for managing modem pools that disconnects users only if not enough modems are available for other users to connect. Managing the modem pool then becomes a replacement problem, similar to buffer cache management (e.g., in virtual memory systems) . When a new connection request is ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We examine a policy for managing modem pools that disconnects users only if not enough modems are available for other users to connect. Managing the modem pool then becomes a replacement problem, similar to buffer cache management (e.g., in virtual memory systems) . When a new connection request
Results 11 - 20
of
565